Join Mike Meyers for an in-depth discussion in this video Asymmetric encryption, part of CompTIA Network+ Exam Prep (N10-006) Part 4: Making TCP/IP Work.
- One of the big problems with symmetric encryption…is that in order for somebody to decrypt your encrypted data…they have to have a copy of the key.…So in a symmetric encryption environment…keys are passed around through whatever,…the internet, the wireless whatever it might be,…and that can cause potential problems…because if somebody can get their hands on the key…and the encrypted text, well, they can pretty much hack it.…So three guys a long time ago called Rivest, Shamir…and Adleman created a new methodology for encryption…that they called Asymmetric Encryption.…
Now Asymmetric Encryption is very, very interesting…and in order for me to show you how it works,…I'm going to have to enlist some help…from my buddy Mike Jones.…Okay not the rapper, but why not, he's from Houston.…The big difference between asymmetric and symmetric…encryption is that with asymmetric encryption…you don't have one key, you've got two.…So you have what's called a Public Key…and then you have what's called a Private Key.…Now, this is kind of cool because,…
We are now a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Skill Level Intermediate
1. TCP/IP Applications
2. Network Naming
3. Securing TCP/IP
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.